| 淡江大學 |
2023-08-08T04:06:19Z |
Cryptocurrency Return Dependency and Economic Policy Uncertainty
|
Yen, Kuang-Chieh;Nie, Wei-Ying;Chang, Hsuan-Ling;Chang, Li-Han |
| 淡江大學 |
2023-09 |
Cryptocurrency Return Dependency and Economic Policy Uncertainty
|
Kuang-Chieh Yen; Wei-Ying Nie; Hsuan-Ling Chang; Li-Han Chang |
| 國立臺灣大學 |
2008-09 |
Cryptogenic organizing pneumonia mimicking community-acquired pneumonia with acute respiratory failure: A case report
|
Huang, Chun-Ta; Chang, Yih-Leong; Tsai, Yi-Ju; Ku, Shih-Chi; Yu, Chong-Jen |
| 國立臺灣大學 |
2008 |
Cryptogenic Organizing Pneumonia Mimicking Community-Acquired Pneumonia with Acute Respiratory Failure: A Case Report
|
黃俊達; 張逸良; 蔡怡汝; 古世基; 余忠仁; HUANG, CHUN-TA; CHANG, YIH-LEONG; TSAI, YI-JU; KU, SHIH-CHI; YU, CHONG-JEN |
| 中國醫藥大學 |
2010-10 |
Cryptogenic pyogenic liver abscess as a sign of colorectal cancer: a population-based 5-year follow-up study
|
賴學洲(Hsueh-Chou Lai); 林恆慶(Herng-Ching Lin)* |
| 淡江大學 |
1991-10 |
Cryptographic authentication of passwords
|
Chang, C. C.; 黃心嘉; Hwang, Shin-jia |
| 國立臺灣科技大學 |
1994 |
Cryptographic implementation of dynamic access control in user hierarchy
|
Wu, T.C. |
| 佛光大學 |
1999-06-01 |
Cryptographic Implementation of Supervising Secure Communications for Rooted Poset User Hierarchy
|
吳宗杉;Wu T.C. |
| 國立臺灣科技大學 |
1992 |
Cryptographic key assignment scheme for access control in a hierarchy
|
Chang, C.C;Hwang, R.J;Wu, T.C |
| 淡江大學 |
1992-05 |
Cryptographic key assignment scheme for access control in a hierarchy
|
Chang, Chin Chen; Hwang, Ren-junn; Wu, Tzong-Chen |
| 國立交通大學 |
2014-12-08T15:04:55Z |
CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME FOR ACCESS-CONTROL IN A HIERARCHY
|
CHANG, CC; HWANG, RJ; WU, TC |
| 國立臺灣大學 |
1999-09 |
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
|
Kuo, F.H.; Shen, V.R.L.; Chen, T.S.; Lai, F. |
| 臺大學術典藏 |
2018-09-10T07:43:12Z |
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
|
Kuo, F.H.; Shen, V.R.L.; Chen, T.S.; Lai, F.; FEI-PEI LAI |
| 國立臺灣科技大學 |
2001 |
Cryptographic key assignment scheme for hierarchical access control
|
Wu, T.C;Chang, C.C |
| 大葉大學 |
2001-08 |
Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme
|
溫志宏;許正興 |
| 中原大學 |
1999-06 |
Cryptographic Keys Assignment for Access Control in a Tree Structure Based Upon Modular Exponentiation
|
涂世雄;張榮宗;劉愷瑜 ;Twu, Shih-Hsiung;Chang, Jung-Tsung;Liu, Kai-Yu |
| 國立成功大學 |
2011-04-25 |
Cryptographic scheme using genetic algorithm and optical responses of periodic structures
|
Chen, Jia-Shiang; Chen, Yu-Bin; Hsu, Pei-Feng; Nghia Nguyen-Huu; Lo, Yu-Lung |
| 淡江大學 |
1999-05 |
Cryptographically Strong On-Line Key Renewal Protocol
|
Yen, Sung-Ming; Liu, Meng-Tzung; Oyan, Ray-Lin |
| 國立高雄大學 |
2008 |
Cryptography AES
|
王學亮 |
| 國立高雄大學 |
2008 |
Cryptography Classical Encryption Technique
|
王學亮 |
| 國立高雄大學 |
2008 |
Cryptography Overview
|
王學亮 |
| 嘉南藥理大學 |
2009 |
CryptoLogic, Inc. SWOT Analysis
|
EBSCO-HTC |
| 國立臺灣大學 |
1988 |
Cryptophthalmos Syndactyly Snydrome:Case Report
|
侯平康; Tsai, Young-Chung; Tsai, Juio-Ting; Hou, Ping-Kong; Tsai, Young-Chung; Tsai, Juio-Ting |
| 國立臺灣大學 |
1984 |
Cryptosporidiosis in Domestic Birds
|
Tsai, S. S.; Ho, L. F.; 張照夫; 朱瑞民; Tsai, S. S.; Ho, L. F.; Chang, Chao-Fu; Chu, Redman M. |
| 國立成功大學 |
2024-02-1 |
Cryptosystem for IoT Devices With Feedback Operation Modes Based on Shared Buffer and Unrolled-Pipeline Techniques
|
Chin;Wen-Long;Chen;Pin-Wei;Chou;Shih-Hsiang;Yang;Yu-Hua;Chen;Pei-Yin;Jiang;Tao |